Chapter 49 Authentication Method
ISG50 User’s Guide
640
4 Click OK to save the settings.
Figure 427 Example: Using Authentication Method in VPN
49.2 Authentication Method Objects
Click Configuration > Object > Auth. Method to display the screen as shown.
Note: You can create up to 16 authentication method objects.
Figure 428 Configuration > Object > Auth. Method
The following table describes the labels in this screen.
Table 253 Configuration > Object > Auth. Method
LABEL DESCRIPTION
Add Click this to create a new entry.
Edit Double-click an entry or select it and click Edit to open a screen where you can
modify the entry’s settings.
Remove To remove an entry, select it and click Remove. The ISG50 confirms you want to
remove it before doing so.
Object
References
Select an entry and click Object References to open a screen that shows which
settings use the entry. See Section 12.3.2 on page 246 for an example.
# This field displays the index number.
Method Name This field displays a descriptive name for identification purposes.
Method List This field displays the authentication method(s) for this entry.
Add icon Click Add to add a new entry.
Click Edit to edit the settings of an entry.
Click Delete to remove an entry.